Abuse to Bitcoin address
1LbaVYJD7tki7PbUaL8nyHY668MLjh78EK

Sextortion

Abuser: unknown

Typical Sextortion scam email stating that accounts have been hacked and the scammer has captured porn videos along with web camera video via RDP connection and will distribute the videos to all contacts unless $1000 is paid to the bitcoin wallet 1LbaVYJD7tki7PbUaL8nyHY668MLjh78EK within 2 days.

United States flag United States, 2019-04-06 21:31:57

Sextortion

Abuser: FAKE-MAIL as MY Adress, but is [email protected]

again and again and again ... sended from MY Mail-Adress? Yes, of course, but the header of the mail says an other adress (X-Sender-Info: <[email protected]>). Very weak scam. Same text as read sooo often... pay 1000€ otherwise videos will send to all my contacts of my Mail-Programm, showing me watching porn... recorded by my own Webcam... yeah.... I didn't even HAVE a Webcam! Same shit, diffrent Bitcoin Address.

Germany flag Germany, 2019-04-08 11:00:30

Sextortion

Abuser: [email protected]

Blabla "Your account is infected", pornvideo's, webcam, etc.

Netherlands flag Netherlands, 2019-04-10 13:24:31

Sextortion

Abuser: [email protected]

The idiot says he has dirty pics. He then goes on to say that women laugh at his small cock and that he needs the money to buy more sheep since sheep apparently don't laugh at his small cock. Probably a Russian.

Canada flag Canada, 2019-04-19 21:39:13

Sextortion

Abuser: [email protected]

Spoofed email sent from recipient with attached image of text claiming email was hacked. Demand 1000USD. Header indicated source server: pcrline.com

United States flag United States, 2019-04-22 14:38:32

Sextortion

Abuser: [email protected]

Old Scam Trick... "I have videos from you watching porn, recorded by your webcam. Pay 1000€ blahblahblah" Very funny, I have no webcam! And where are the Pictures of proof? Very weak scam, but I'm getting these annoying mails every day, so this is also not very believable.

Germany flag Germany, 2019-04-24 13:19:58

Ransomware

Abuser: X-AntiAbuse: Primary Hostname - royal.serverchamber.com

Return-Path: <[email protected]> Received: from royal.serverchamber.com (royal.serverchamber.com [167.114.126.65]) Authentication-Results: vade-backend18.dreamhost.com; dkim=pass reason="1024-bit key; unprotected key" header.d=land-of-oz.com [email protected] header.b=PIsabYhE; dkim-adsp=none (unprotected policy); dkim-atps=neutral DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=land-of-oz.com; s=default; h=Date:Subject:From:Message-ID:To:MIME-Version: Received: from 114-35-61-4.hinet-ip.hinet.net ([114.35.61.4]:52071 helo=[114-35-61-4.HINET-IP.hinet.net]) by royal.serverchamber.com with esmtpsa (TLSv1:ECDHE-RSA-AES256-SHA:256) (Exim 4.91) (envelope-from <[email protected]>) id 1hDfcp-0003Nu-If Errors-To: [email protected]

United States flag United States, 2019-05-15 05:21:10